Verifying the CBH System configurations
After the instance specifications are changed, log in the CBH system as system administrator admin to verify system configuration consistence for each module in the navigation pane of the CBH system.
You need to verify system configurations in the department, user, resource, policy, ticket, audit, operation, and system modules. For more details, see Table 1
Level 1 Module |
Level 2/3 Module |
Verification Item |
---|---|---|
Department |
None |
Department level, department name, number of users, and number of hosts. |
User |
User |
Number of users and basic information about each user, such as the login name, user name, status, role, and department. |
User Group |
Number of user groups, user group names, and group members. |
|
Role |
Role configuration. |
|
Resource |
Host |
Number of managed hosts and basic information about each managed host, including the host name, host address, port number, protocol type, OS type, and number of accounts. |
Application Publish |
|
|
Account |
|
|
Account Group |
Number of account groups, account group names, members in an account group, and number of members in an account group. |
|
Operation |
Host label |
Number of labels of managed hosts, such as the number of labels, names, and labeled hosts. |
Application Label |
Verify the configuration information about the number of tags, names, and tagged application resources released by the application. |
|
Policy |
ACL Rules |
Number of ACL rules and basic information about each ACL rule, such as rule name, status, associated users, and associated accounts. |
Cmd Rules |
|
|
Chpwd Rules |
Number of policies and basic information about each policy, such as policy names, status, execution modes, and password change mode. |
|
Audit |
System Report |
Auto Send configuration |
Ops Report |
Auto Send configuration |
|
Ticket |
ACL Ticket |
Basic information about the authorization ticket, including ticket number, status, and application time |
System |
Security |
System login security configuration, including user locking, policy password, web login, and SSH client login. |
Outgoing |
Email and SMS gateway configuration. |
|
Authenticate |
AD domain, RADIUS, and LDAP authentication configurations. |
|
Ticket |
Basic settings and approval process of tickets. |
|
Alarm |
Alarm channel and alarm level (severity) |
|
Storage Mgmt |
Auto deletion. |
|
Log Backup |
Remote backup to the Syslog server and remote backup to the FTP/SFTP server. |
|
Backup&Restore |
Automatic configuration backups. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot